US8521872B2 - Computer product, verification support apparatus, and verification support method - Google Patents
Computer product, verification support apparatus, and verification support method Download PDFInfo
- Publication number
- US8521872B2 US8521872B2 US13/064,901 US201113064901A US8521872B2 US 8521872 B2 US8521872 B2 US 8521872B2 US 201113064901 A US201113064901 A US 201113064901A US 8521872 B2 US8521872 B2 US 8521872B2
- Authority
- US
- United States
- Prior art keywords
- time
- packet
- data
- transmitted
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/24—Testing correct operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
- H04L43/0858—One way delays
Definitions
- the embodiment discussed herein is related to device verification.
- the transaction When a series of data (transaction) in an arbitrary process is transmitted from a transmission source to a transmission destination, the transaction is divided into packets and transmitted. If there are multiple transactions, respective packets of the transactions are transmitted in a prescribed sequence. For example, for transactions A and B, the prescribed sequence may be an alternating transmission of 1 packet of transaction A and 1 packet of transaction B.
- a conventional technology related to packet transmission evaluates network quality.
- the flow of communication between communication terminals is subject to measurement and extracted from packet header information.
- the conventional technology estimates network communication quality that includes information related to packet loss on the network, based on header information inclusive of a packet sequence number and from time series information concerning packet arrival at the receiving apparatus.
- Japanese Laid-Open Patent Publication No. 2005-210515 Japanese Laid-Open Patent Publication No. 2001-111608, Japanese Laid-Open Patent Publication No. 2008-17407, and Japanese Laid-Open Patent Publication No. H6-152648.
- a computer-readable, non-transitory medium stores therein a verification support program that causes a computer to execute a process that includes detecting a point in time when data of any one transaction among a series of transactions that are to be transmitted in a prescribed sequence from a device under verification, is skipped; detecting a point in time when the data is first transmitted after the detected point in time when the data is skipped; computing time elapsing from the detected point in time when the data is skipped until the detected point in time when the data is transmitted; and outputting a computation result obtained at the computing.
- FIG. 1 is a diagram of an example of a system according to an embodiment.
- FIG. 2 is a diagram of an example of processing by a verification support apparatus according to the embodiment.
- FIG. 3 is a diagram of another example of processing by the verification support apparatus according to the embodiment.
- FIG. 4 is a block diagram of one example of a hardware configuration of the verification support apparatus according to the embodiment.
- FIG. 5 is a diagram of a functional configuration of the verification support apparatus according to the embodiment.
- FIG. 6 is a diagram of an example of simulation results.
- FIG. 7 is a diagram of one example the contents of a delay-time table.
- FIG. 8 is a diagram of one example of the contents of a count table.
- FIG. 9 is a diagram of an example of a delay list.
- FIG. 10 is a diagram of an example of a list.
- FIG. 11 is a diagram of an example a packet being transmitted out of sequence.
- FIG. 12 is a diagram of an example of node deletion in the list.
- FIG. 13 is a flowchart of an example of verification support processing executed by the verification support apparatus according to the embodiment.
- FIG. 14 is another flowchart of the example of the verification support processing executed by the verification support apparatus according to the embodiment.
- FIG. 15 is yet another flowchart of the example of the verification support processing executed by the verification support apparatus according to the embodiment.
- FIG. 1 is a diagram of an example of a system according to an embodiment.
- a system 100 includes a verification support apparatus 101 , a transmission source device 102 , and a transmission destination device 103 , respectively connected through a bus 110 .
- the verification support apparatus 101 is a computer that supports verification of the operation of the transmission source device 102 .
- the transmission source device 102 is a device subject to verification and cyclically transmits a series of transactions T 1 to Tn in a prescribed sequence.
- the transmission source device 102 is, for example, a universal serial bus (USB) host controller.
- the transmission destination device 103 is a device that receives the series of transactions T 1 to Tn transmitted from the transmission source device 102 .
- the transmission destination device 103 is, for example, a USB device.
- the transmission source device 102 and the transmission destination device 103 may be models designed using hardware description language (HDL) and the like, or may be implemented by a field programmable gate array (FPGA) based on design data.
- HDL hardware description language
- FPGA field programmable gate array
- each of the transactions T 1 to Tn are groups of data.
- the data included in each of the transactions T 1 to Tn are information that includes an identifier of the data, content, etc.
- explanation is given using a packet that includes a data portion and a header portion as one example of the data.
- a USB host controller is used as the transmission source device 102 and a USB device is used as the transmission destination device 103 in the description.
- FIGS. 2 and 3 are diagrams of examples of processing by the verification support apparatus according to the embodiment.
- the transmission source device 102 which herein is a USB host controller, manages time in units of frames and controls the transmission of each packet Pi.
- the header portion of each packet Pi includes an identifier (transaction identification (ID)) indicative of the transaction Ti, a destination address, etc.
- ID transaction identification
- the transactions T 1 to Tn transmitted from the transmission source device 102 to transmission destination device 103 are the transactions T 1 to T 5 and the prescribed sequence is the order “T 1 ⁇ T 2 ⁇ . . . ⁇ T 5 ”, i.e., the transaction IDs in ascending order.
- the prescribed sequence is the order “T 1 ⁇ T 2 ⁇ . . . ⁇ T 5 ”, i.e., the transaction IDs in ascending order.
- packets P 1 and P 2 are transmitted in the prescribed sequence.
- Packet P 4 is transmitted when, according to the prescribed sequence, packet P 3 should be transmitted from the transmission source device 102 to the transmission destination device 103 .
- packet P 3 which should be transmitted after packet P 2 , is skipped (in FIG. 2 , a dotted-line box) and instead packet P 4 is transmitted.
- Factors causing packet P 3 to be skipped include, for example, those related to faulty operation of the transmission source device 102 , those based on communication protocol, design specifications of the transmission source device 102 , etc.
- packet P 3 If packet P 3 is skipped, there is a time delay until packet P 3 is transmitted.
- the delay time for packet P 3 is the time that elapses until the transmission of transaction T 3 from the transmission source device 102 is completed.
- each time a packet Pi that, according to the prescribed sequence, should be transmitted is skipped, the time that elapses until the first transmission of the packet Pi after the skipping is sought and presented.
- the verification support apparatus 101 first detects time t 1 , the time when packet P 3 of the transaction T 3 is skipped. For example, the verification support apparatus 101 detects the time of transmission of packet P 4 in place of that of packet P 3 (which has been skipped) as the time t 1 when packet P 3 is skipped.
- the verification support apparatus 101 detects time t 2 , the time when packet P 3 is transmitted for the first time after being skipped at time t 1 .
- the verification support apparatus 101 detects, as the time t 2 , the time of the first transmission of packet P 3 after the time t 1 when packet P 3 is skipped.
- the verification support apparatus 101 computes the time (time d 1 ) that elapses from the time t 1 when packet P 3 is skipped until the time t 2 when packet P 3 is transmitted.
- the time d 1 is the delay time that occurs for packet P 3 , consequent to the skipping of packet P 3 .
- the verification support apparatus 101 outputs the computed time d 1 as the delay time for packet P 3 .
- packets P 1 and P 2 are transmitted in the prescribed sequence.
- Packet P 5 is transmitted when, according to the prescribed sequence, packet P 3 should be transmitted from the transmission source device 102 .
- packet P 3 which should be transmitted after packet P 2 , is skipped and in succession, packet P 4 is also skipped (in FIG. 3 , the dotted-line box).
- the verification support apparatus 101 first detects time t 3 , the time when packet P 3 of the transaction T 3 is skipped. For example, the verification support apparatus 101 detects the time of transmission of packet P 5 in place of that of packet P 3 which is skipped, as the time t 3 when packet P 3 is skipped.
- the verification support apparatus 101 detects time t 4 , the time when packet P 3 is transmitted for the first time after being skipped.
- the verification support apparatus 101 computes the time (time d 2 ) that elapses from the time t 3 when packet P 3 is skipped until the time t 4 when packet P 3 is transmitted.
- the time d 2 is the delay time that occurs for packet P 3 , consequent to the skipping of packet P 3 .
- the verification support apparatus 101 outputs the computed time d 2 as a wait-time for packet P 3 .
- the verification support apparatus 101 detects time t 3 , the time when packet P 4 of the transaction T 4 is skipped. This time t 3 is equivalent to the time when packet P 3 of the transaction T 3 is skipped. In other words, if packets P 3 and P 4 are successively skipped, the time at which the packets P 3 and P 4 are skipped is the same for both packets P 3 and P 4 .
- the verification support apparatus 101 detects time t 5 , the time when packet P 4 is transmitted for the first time after being skipped at the time t 3 .
- the verification support apparatus 101 detects, as the time t 5 , the time of the first transmission of packet P 4 after the time t 3 when packet P 4 is skipped.
- the verification support apparatus 101 computes the time (time d 3 ) that elapses from the time t 3 when the packet P 4 is skipped until the time t 5 when packet P 4 is transmitted, and outputs the computed time d 3 as the delay time for packet P 4 .
- the verification support apparatus 101 described if a packet Pi of transaction Ti is to be transmitted according to the prescribed sequence, but instead is skipped, the time that elapses until the packet Pi is transmitted for the first time after being skipped is sought and provided. As a result, the amount of time that the commencement of transmission of the packet Pi is delayed consequent to the transmission source device 102 failing to transmit the packet Pi in the prescribed sequence can be identified.
- the amount of delay in the completion of the transmission for the transaction Ti can be identified.
- the verification engineer is able to verify whether the delay time for transaction Ti is value at most that permissible by the designer or customer.
- FIG. 4 is a block diagram of one example of a hardware configuration of the verification support apparatus according to the embodiment.
- the verification support apparatus 101 includes a central processing unit (CPU) 401 , a read-only memory (ROM) 402 , a random access memory (RAM) 403 , a magnetic disk drive 404 , a magnetic disk 405 , an optical disk drive 406 , an optical disk 407 , a display 408 , an interface (I/F) 409 , a keyboard 410 , a mouse 411 , a scanner 412 , and a printer 413 , respectively connected by a bus 400 .
- CPU central processing unit
- ROM read-only memory
- RAM random access memory
- magnetic disk drive 404 a magnetic disk 405
- an optical disk drive 406 an optical disk 407
- display 408 a display 408
- an interface (I/F) 409 a keyboard 410 , a mouse 411 , a scanner 412 , and a printer 413
- the CPU 401 governs overall control of the verification support apparatus 101 .
- the ROM 402 stores therein programs such as a boot program.
- the RAM 403 is used as a work area of the CPU 401 .
- the magnetic disk drive 404 under the control of the CPU 401 , controls the reading and writing of data with respect to the magnetic disk 405 .
- the magnetic disk 405 stores therein data written under control of the magnetic disk drive 404 .
- the optical disk drive 406 under the control of the CPU 401 , controls the reading and writing of data with respect to the optical disk 407 .
- the optical disk 407 stores therein data written under control of the optical disk drive 406 , the data being read by a computer.
- the display 408 displays, for example, data such as text, images, functional information, etc., in addition to a cursor, icons, and/or tool boxes.
- a cathode ray tube (CRT), a thin-film-transistor (TFT) liquid crystal display, a plasma display, etc., may be employed as the display 408 .
- the I/F 409 is connected to a network 414 such as a local area network (LAN), a wide area network (WAN), and the Internet through a communication line and is connected to other apparatuses through the network 414 .
- the I/F 409 administers an internal interface with the network 414 and controls the input/output of data from/to external apparatuses.
- a modem or a LAN adaptor may be employed as the I/F 409 .
- the keyboard 410 includes, for example, keys for inputting letters, numerals, and various instructions and performs the input of data. Alternatively, a touch-panel-type input pad or numeric keypad, etc. may be adopted.
- the mouse 411 is used to move the cursor, select a region, or move and change the size of windows.
- a track ball or a joy stick may be adopted provided each respectively has a function similar to a pointing device.
- the scanner 412 optically reads an image and takes in the image data into the verification support apparatus 101 .
- the scanner 412 may have an optical character reader (OCR) function as well.
- OCR optical character reader
- the printer 413 prints image data and text data.
- the printer 413 may be, for example, a laser printer or an ink jet printer.
- FIG. 5 is a diagram of a functional configuration of the verification support apparatus according to the embodiment.
- the verification support apparatus 101 includes an acquisition unit 501 , a first detector unit 502 , a second detector unit 503 , a first computation unit 504 , a second computation unit 505 , a delay determination unit 506 , a counter unit 507 , a third computation unit 508 , a ratio determination unit 509 , and an output unit 510 .
- Functions of the functional units are implemented by, for example, the CPU 401 executing a program stored in a storage device such as the ROM 402 , the RAM 403 , the magnetic disk 405 , and the optical disk 407 depicted in FIG. 4 , or by the I/F 409 .
- processing results obtained by the functional units are stored to a storage device such as the RAM 403 , the magnetic disk 405 , and the optical disk 407 .
- the acquisition unit 501 acquires information concerning a packet Pi transmitted from the transmission source device 102 to the transmission destination device 103 .
- information concerning the packet Pi (hereinafter, packet information) is, for example, information included in the header portion of the packet Pi, such as the time of transmission of the packet Pi, the transaction ID of the transaction Ti that includes the packet Pi, a transfer scheme, etc.
- the transfer scheme for the transaction Ti is, for example, bulk transfer, interrupt transfer, control transfer, isochronous transfer (data flow transfer), etc.
- multiple transfer schemes are indicated as “transfer schemes Ty[ 1 ] to Ty[m]” and a transfer scheme for a transaction Ti is indicated as “transfer scheme Ty[j]”.
- the time of transmission of a packet Pi may be the actual time of transmission, a time in the context of the simulation, etc.
- the acquisition unit 501 may acquire packet information by receiving a packet Pi from the transmission source device 102 . Further, if the transmission source device 102 is simulated, the acquisition unit 501 may acquire simulation results as packet information. Herein, an example of simulation results will be described.
- FIG. 6 is a diagram of an example of simulation results.
- simulation results 600 is a collection of packet information Sk for packets Pi transmitted from the transmission source device 102 to the transmission destination device 103 from the beginning to the end of a simulation of the operation of the transmission source device 102 .
- order is the transmission sequence in which a packet Pi is transmitted from the transmission source device 102 .
- Packet ID is the identifier for a packet Pi.
- Transaction ID is the identifier for a transaction Ti.
- Transfer scheme is the transfer scheme Ty[j] for a transaction Ti.
- the time of transmission is the time of transmission of the packet Pi.
- the acquisition unit 501 may collectively acquire the simulation results from the beginning of the simulation to the end of the simulation. Further, the acquisition unit 501 may acquire, in real-time, the packet information Sk for the packet Pi transmitted from the transmission source device 102 to the transmission destination device 103 .
- the reference of the description returns to FIG. 5 .
- the first detector unit 502 detects the time (time tx) when a packet Pi of a transaction Ti, among the transactions T 1 to Tn that are to be transmitted cyclically in the prescribed sequence from the transmission source device 102 , is skipped.
- the prescribed sequence in which the transactions T 1 to Tn are to be transmitted is, for example, arbitrarily set by the designer of the transmission source device 102 .
- the transmission sequence may be prescribed by designating the transaction that is to be transmitted first, while for other transactions, the transaction that precedes a given transaction is designated. Further, the transmission sequence may be prescribed by designating the order of each transaction. In the description hereinafter, a sequence (T 1 ⁇ T 2 ⁇ . . . ⁇ Tn), i.e., ascending order of the transaction IDs, is used as the prescribed sequence in which the transactions T 1 to Tn are transmitted.
- the first detector unit 502 based on simulation results for the transmission source device 102 , identifies a packet P[k] that has been transmitted out of sequence with respect to the prescribed sequence. Subsequently, the first detector unit 502 identifies the packet (packet P[ 1 ]) that was transmitted from the transmission source, immediately before the packet P[k].
- the first detector unit 502 identifies packets P[l+1], P[l+2], . . . , P[k ⁇ 1] as packets Pi that, according to the prescribed sequence, have been skipped between the transmission of packet P[ 1 ] and packet P[k]. Further, the first detector unit 502 detects the time of the transmission of packet P[k] as the time that each of the packets Pi was skipped, time tx.
- the first detector unit 502 identifies packet P 4 as a packet that has been transmitted out of sequence with respect to the prescribed sequence. Subsequently, the first detector unit 502 identifies packet P 2 as the packet that was transmitted, from the transmission source device 102 , immediately before packet P 4 . Next, the first detector unit 502 detects packet P 3 , which according to the prescribed sequence, is between packet P 2 and packet P 4 , as a packet that has been skipped. Then, the first detector unit 502 detects the time of the transmission of packet P 4 as the time tx that packet P 3 was skipped.
- the first detector unit 502 identifies packet P 5 as a packet that has been transmitted out of sequence with respect to the prescribed sequence. Subsequently, the first detector unit 502 identifies packet P 2 as the packet that was transmitted, from the transmission source device 102 , immediately before packet P 5 . Next, the first detector unit 502 detects packets P 3 and P 4 , which according to the prescribed sequence, are between packet P 2 and packet P 5 , as packets that have been skipped. Then, the first detector unit 502 detects the time of the transmission of packet P 5 as the time tx that packets P 3 and P 4 were skipped.
- the second detector unit 503 detects the time ty when packet Pi is transmitted for the first time after being skipped at the time tx. For example, based on the simulation results for the transmission source device 102 , the second detector unit 503 identifies the first packet Pi that is transmitted after the time of transmission of packet P[k], which was transmitted out of sequence with respect to the prescribed sequence. Then, the second detector unit 503 detects the time of transmission of the identified packet Pi as the time ty.
- the first computation unit 504 computes the time d[i] that elapses from the time tx when packet Pi is skipped until the time ty when packet Pi is transmitted.
- the time d[i] is the delay time (i.e., the excess time consumed for commencement of the transmission of packet Pi) consequent to the transmission source device 102 failing to transmit packet Pi in the prescribed sequence.
- the first computation unit 504 computes, as the time d[i], the difference between the time of transmission of packet P[k], which was transmitted out of sequence with respect to the prescribed sequence, and the time of the first transmission of packet Pi after the time of transmission of packet P[k].
- the second computation unit 505 computes a delay time D[i] for each transaction Ti by summing, for each transaction Ti, the time d[i] computed for packets Pi.
- the delay time D[i] is the delay time (i.e., the excess time consumed for completion of the transmission of the transaction Ti), which is equivalent to the sum of the respective times d[i] of packets Pi that are skipped among packets Pi included in the transaction Ti.
- the computed delay time D[i] related to the transaction Ti is stored to a delay-time table 700 depicted in FIG. 7 , for example.
- contents of the delay-time table 700 will be described.
- the delay-time table 700 for example, is implemented by a storage device, such as the RAM 403 , the magnetic disk 405 , and the optical disk 407 .
- FIG. 7 is a diagram of one example the contents of a delay-time table.
- the delay-time table 700 has fields including transaction ID, delay time, and determination flag.
- Delay-time information 700 - 1 to 700 - n related to the transactions T 1 to Tn, are stored as records through a setting of information in each of the fields.
- a transaction ID is the identifier of a transaction Ti.
- a delay time is the delay time D[i] corresponding to the transaction Ti.
- a determination flag is a flag that is changed according to determination results obtained by the delay determination unit 506 , described hereinafter.
- a determination flag has a value of “0” in the initial state. The determination flag is described in detail hereinafter.
- the contents of the delay-time table 700 are updated upon computation of the delay time D[i] related to the transaction Ti, the delay time D[i] being computed by the second computation unit 505 . For example, upon computation of the delay time D[ 1 ] corresponding to the transaction T 1 , the delay time included in the delay-time information 700 - 1 in the delay-time table 700 is updated.
- the delay determination unit 506 determines whether the computed delay time D[i] corresponding to the transaction Ti is greater than a given threshold Dth. For example, the delay determination unit 506 refers to the delay-time table 700 depicted in FIG. 7 and determines whether the delay time D[i] corresponding to the transaction Ti is greater than the threshold Dth.
- the threshold Dth is set to be equal to or less than a value allowed (by the designer or customer) as the delay time D[i] related to the transaction Ti. For example, if it is desirable to control the delay time D[i] to be ⁇ or less, the threshold Dth is set to be ⁇ .
- the threshold Dth is, for example, preliminarily set and stored in a storage device such as the ROM 402 , the RAM 403 , the magnetic disk 405 , and the optical disk 407 depicted in FIG. 4 .
- the determination flag of the delay-time information 700 - i in the delay-time table 700 is changed from “0” to “1”. By referring to the determination flags in the delay-time table 700 , each transaction Ti that has a delay time D[i] greater than the threshold Dth can be identified.
- the counter unit 507 for each transfer scheme of transferring transaction Ti, counts the number of delay times D[i] (respectively corresponding to transactions Ti) that have been determined to be greater than the threshold Dth (count C[j]). For example, the counter unit 507 refers to the packet information Sk concerning such a packet Pi that has been skipped and identifies the transfer scheme Ty[j] of the transaction Ti. Then, the counter unit 507 , by incrementing the count C[j] for the transfer scheme Ty[j] in a count table 800 depicted in FIG. 8 , counts the number of times the threshold is exceeded for the transfer scheme Ty[j].
- the third computation unit 508 computes the ratio R[j] of the count C[j] for the transfer scheme Ty[j] with respect to a total count C ALL .
- the total count C ALL is a sum of the counts C[ 1 ] to C[m] for transfer schemes Ty[ 1 ] to Ty[m].
- the third computation unit 508 uses equation (3) below to sum the counts C[ 1 ] to C[m] to compute the total count C ALL .
- the counts C[ 1 ] to C[m] can be identified, for example, by referring to the count table 800 depicted in FIG. 8 .
- the ratio R[j] computed for the transfer scheme Ty[j] is, for example, stored to the count table 800 depicted in FIG. 8 .
- the count table 800 is implemented by, for example, a storage device such as the RAM 403 , the magnetic disk 405 , and the optical disk 407 .
- FIG. 8 is a diagram of one example of the contents of the count table.
- the count table 800 has fields including transfer scheme and count. By a setting of information in each of the fields, count information 800 - 1 to 800 - m for each transfer scheme Ty[ 1 ] to Ty[m] is stored as records.
- a transfer scheme is the transfer scheme Ty[j] for a transaction Ti.
- a count is the count C[j] indicative of the number of delay times D[i] (respectively corresponding to transactions Ti) that have been determined to be greater than the threshold Dth.
- the initial value for each count C[j] is “0”.
- Ratio is the ratio R[j] of the count C[j] with respect to the total count C ALL .
- the ratio determination unit 509 determines whether the computed ratio R[j] of the count C[j] for the transfer scheme Ty[j] is greater than a given threshold Rth.
- the threshold Rth is set, for example, as numeric values such as 30, 40, and 50.
- the threshold Rth is, for example, preliminarily set and stored in a storage device such as the ROM 402 , the RAM 403 , the magnetic disk 405 and the optical disk 407 depicted in FIG. 4 .
- the transfer scheme Ty[j] for which the ratio R[j] is determined to be greater than the threshold Rth is, for example, recorded to a delay list 900 depicted in FIG. 9 .
- the threshold Rth is 30.
- FIG. 9 is a diagram of an example of a delay list.
- the delay list 900 is information that indicates the transfer schemes Ty[j] for which the ratio R[j] has been determined be greater than the threshold Rth.
- the delay list 900 transfer schemes Ty[ 1 ] and Ty[ 3 ] for which the ratio R[j] exceeds the threshold are displayed.
- the ratio R[ 1 ] of the transfer scheme Ty[ 1 ] is 33% and the ratio R[ 1 ] of the transfer scheme Ty[ 1 ] is 41%.
- the output unit 510 outputs results of the determination by the ratio determination unit 509 .
- the output unit 510 may output the delay list 900 depicted in FIG. 9 .
- Forms of output by the output unit 510 include, for example, display on the display 408 , print out at the printer 413 , and transmission to an external apparatus via the I/F 409 as well as storage to a storage area such as the RAM 403 , the magnetic disk 405 , and the optical disk 407 .
- the output unit 510 may output the time d[i] for the packet Pi computed by the first computation unit 504 .
- the delay time i.e., the excess time consumed for commencement of the transmission of the packet Pi
- the delay time consequent to the transmission source device 102 failing to transmit the packet Pi in the prescribed sequence can be identified.
- the output unit 510 may output the delay time D[i] corresponding to the transaction Ti and computed by the second computation unit 505 .
- the delay time i.e., the excess time consumed for completion of the transmission for the transaction Ti
- the delay time equivalent to the sum of the respective times d[i] of packets Pi that are skipped among packets Pi included in the transaction Ti, can be identified.
- the output unit 510 may output the results of the determination by the delay determination unit 506 .
- transactions Ti for which the delay time D[i] is greater than a value (threshold Dth) allowed by the designer or customer can be identified.
- the output unit 510 may output the counts C[j] for each of the transfer schemes Ty[j], counted by the counter unit 507 .
- the counts C[j] indicative of the number of transactions Ti having a delay time D[i] that is greater than the threshold Dth can be identified for each transfer scheme Ty[j].
- FIG. 10 is a diagram of an example of a list.
- the list 1000 is information indicative of the prescribed sequence for packets P 1 to P 3 of the transactions T 1 to T 3 .
- the list 1000 includes nodes N 1 to N 3 representative of the transactions T 1 to T 3 , respectively.
- Each node has a field 1001 and a field 1002 .
- Field 1001 stores the node ID of a subsequent node.
- a subsequent node is a node representing the transaction that is to be transmitted subsequent to a given node also representing a transaction.
- a Node ID is the identifier of a node.
- field 1001 of node N 1 stores the node ID of node N 2 “N 2 ”.
- Field 1001 of node N 2 stores the node ID of node N 3 “N 3 ”.
- Field 1001 of node N 3 stores the node ID of node N 1 “N 1 ”.
- the list 1000 indicates that the transactions T 1 to T 3 are transmitted in the order “T 1 ⁇ T 2 ⁇ T 3 ”.
- Field 1002 stores the transaction ID of the transaction corresponding to a given node.
- field 1002 of node N 1 stores the transaction ID “T 1 ” of the transaction T 1 .
- Field 1002 of node N 2 stores the transaction ID “T 2 ” of the transaction T 2 .
- Field 1002 of node N 3 stores the transaction ID “T 3 ” of the transaction T 3 .
- the first detector unit 502 identifies the subsequent node stored in field 1001 of the current node, upon selection of packet Pi from among packets transmitted from the transmission source device 102 to the transmission destination device 103 . Packet Pi is selected in the transmission sequence transmitted from the transmission source device 102 to the transmission destination device 103 .
- the current node is a reference node within the list 1000 and in the initial state, is set as the tail node, node N 3 .
- the first detector unit 502 determines whether the transaction ID stored in field 1002 of the subsequent node and the transaction ID of the selected packet Pi coincide.
- the first detector unit 502 sets the subsequent node as the current node in the list 1000 . On the other hand, if the transaction IDs do not coincide, the first detector unit 502 detects the acquired packet Pi as a packet P[k] that has been transmitted out of sequence with respect to the prescribed sequence.
- FIG. 11 is a diagram of an example a packet being transmitted out of sequence.
- numerals appended to solid-line boxes indicate the order in which each packet is transmitted within 1 frame.
- packet P 2 is transmitted fourth.
- the current node set in the list 1000 is node N 3 .
- the first detector unit 502 selects packet P 2 and identifies the subsequent node N 1 which is stored in field 1001 of the current node N 3 .
- the first detector unit 502 determines whether the transaction ID “T 1 ” stored in field 1002 of the subsequent node N 1 and the transaction ID “T 2 ” of the selected packet P 2 coincide.
- the first detector unit 502 detects the packet P 2 as a packet P[k] that has been transmitted out of sequence with respect to the prescribed sequence. Then the first detector unit 502 identifies the packet P 1 of the transaction T 1 , which is identified by the transaction ID stored in field 1002 of the subsequent node N 1 , as a packet Pi that has been skipped.
- the first detector unit 502 sets the current node in the list 1000 as node N 1 , which is the subsequent node of the current node N 3 .
- the first detector unit 502 sets the subsequent node N 2 stored in field 1001 of the current node N 1 and determines whether the transaction ID “T 2 ” stored in field 1002 of the subsequent node N 2 and the transaction ID “T 2 ” of the selected packet P 2 coincide.
- the first detector unit 502 sets the subsequent node N 2 of the current node N 1 as the current node in the list 1000 .
- the processing is repeated until the transaction IDs coincide.
- the skipped packets Pi can be identified.
- a packet P[k] that has been transmitted out of sequence with respect to the prescribed sequence and a packet Pi that has been skipped can be identified.
- the packet Pi transmitted from the transmission source device 102 is the last packet of a transaction Ti.
- nodes Ni representing transactions Ti for which all of the packets Pi have been transmitted are deleted from the list.
- An example will be described where all of the packets P 3 have been transmitted and consequently, node N 3 representing the transaction T 3 is deleted.
- FIG. 12 is a diagram of an example of node deletion in the list.
- a packet P 3 transmitted m-th is the last packet of the transaction T 3 .
- Each packet Pi includes a flag that indicates whether the packet is the last packet of the transaction Ti.
- the current node here is node N 2 .
- the first detector unit 502 determines whether packet P 3 transmitted m-th has been transmitted in the prescribed sequence, the first detector unit 502 further determines whether the packet P 3 is the last packet of the transaction T 3 . For example, the first detector unit 502 refers to the flag of the packet P 3 to determine the packet P 3 to be last packet of the transaction T 3 .
- the first detector unit 502 sets, in field 1001 of the current node N 2 , the node ID “N 1 ” stored in field 1001 of the subsequent node N 3 and deletes node N 3 . In this case, the current node is not changed. Thus, with the completion of the transmission of all of the packets Pi included in the transaction Ti, the configuration of a list (e.g., the list 1000 ) can be corrected.
- a list e.g., the list 1000
- verification support processing executed by the verification support apparatus 101 will be described. An example will be described in which the verification support apparatus 101 uses the simulation results 600 depicted in FIG. 6 to execute the verification support processing.
- FIGS. 13 to 15 are flowcharts of one example of the verification support processing executed by the verification support apparatus according to the embodiment. As depicted in the flowchart of FIG. 13 , first, it is determined whether the acquisition unit 501 has acquired the simulation results 600 for the operation of the transmission source device 102 (step S 1301 ).
- the first detector unit 502 determines whether the packet Pi identified from the selected packet information Sk is a packet P[k] that has been transmitted out of sequence with respect to the prescribed sequence (step S 1304 ). If the packet Pi is not a packet P[k] that has been transmitted out of sequence with respect to the prescribed sequence (step S 1304 : NO), the flow proceeds to step S 1406 depicted in FIG. 14 .
- the first detector unit 502 identifies the skipped packet Pi, based on the simulation results 600 (step S 1305 ). Then, the first detector unit 502 selects an arbitrary packet Pi from among identified skipped packets Pi (step S 1306 ). The processing at step S 1306 may identify multiple packets Pi that have been skipped.
- the first detector unit 502 detects the time of the transmission of the packet P[k] as the time tx when the selected packet Pi was skipped (step S 1307 ).
- the second detector unit 503 identifies the transaction Ti that includes the packet Pi that has been skipped (step S 1308 ).
- the second detector unit 503 refers to the delay-time table 700 and determines whether the determination flag of the identified transaction Ti is “1” (step S 1309 ). If the determination flag is “1” (step S 1309 : YES), the flow proceeds to step S 1405 depicted in FIG. 14 .
- the second detector unit 503 refers to the simulation results 600 and identifies the first packet Pi that is transmitted after the time tx when the packet Pi was skipped (step S 1310 ).
- the second detector unit 503 detects the time of the transmission of the identified packet Pi as the time ty when the packet Pi is transmitted (step S 1311 ). Subsequently, the first computation unit 504 computes the time d[i] that elapsed from the time tx when the packet Pi was skipped until the time ty when the packet Pi was transmitted (step S 1312 ).
- the second computation unit 505 computes the delay time D[i] corresponding to the transaction Ti, by substituting the time d[i] calculated for the packet Pi into equation (2) above (step S 1313 ).
- D[i] of the right term is identified from the delay-time table 700 .
- the second computation unit 505 records to the delay-time table 700 , the delay time D[i] calculated for the transaction Ti (step S 1314 ), and the flow proceeds to step S 1401 depicted in FIG. 14 .
- the delay determination unit 506 refers to the delay-time table 700 and determines whether the delay time D[i] corresponding to the transaction Ti is greater than the threshold Dth (step S 1401 ). If the delay time D[i] is equal to or less than the threshold Dth (step S 1401 : NO), the flow proceeds to step S 1405 .
- step S 1401 YES
- the delay determination unit 506 changes the determination flag that is included in the delay-time information 700 - i in the delay-time table 700 , from “0” to “1” (step S 1402 ).
- the counter unit 507 identifies the transfer scheme Ty[j] of the transaction Ti that includes the skipped packet Pi selected at step S 1306 (step S 1403 ).
- the counter unit 507 increments, in the count table 800 , the count C[j] for the transfer scheme Ty[j] (step S 1404 ).
- the first detector unit 502 determines whether there are any packets Pi that have not been selected at step S 1306 (step S 1405 ).
- step S 1405 If an unselected packet Pi remains (step S 1405 : YES), the flow returns to step S 1306 . On the other hand, if no unselected packet Pi remains (step S 1405 : NO), the first detector unit 502 increments k of the packet information Sk (step S 1406 ), and determines whether k is greater than K (step S 1407 ).
- step S 1407 NO
- step S 1407 YES
- the third computation unit 508 refers to the count table 800 and computes the total count C ALL , which is a summation of the counts C[ 1 ] to C[m].
- the third computation unit 508 uses equation (4) above, computes the ratio R[j] of the count C[j] for the transfer scheme Ty[j] with respect to the total count C ALL (step S 1503 ). Thereafter, the ratio determination unit 509 determines whether the computed ratio R[j] of the count C[j] for the transfer scheme Ty[j] is greater than the threshold Rth (step S 1504 ).
- step S 1504 If the ratio R[j] is less than or equal to the threshold Rth (step S 1504 : NO), the flow proceeds to step S 1506 . On the other hand, if the ratio R[j] is greater than the threshold Rth (step S 1504 : YES), the ratio determination unit 509 records to the delay list 900 , the transfer scheme Ty [j] and the ratio R[j] (step S 1505 ).
- the third computation unit 508 increments j of the transfer scheme Ty[j] (step S 1506 ), and determines whether j is greater than m (step S 1507 ). If j is less than or equal to m (step S 1507 : NO), the flow returns to step S 1503 . On the other hand, if j is greater than m (step S 1507 : YES), the output unit 510 outputs the delay list 900 , ending the processing according to the flowchart.
- the verification support apparatus 101 enables detection of the time tx when a packet Pi of a transaction Ti, among transactions T 1 to Tn that are to be transmitted cyclically in the prescribed sequence is skipped. Further, the verification support apparatus 101 enables detection of the time ty when the packet Pi is transmitted for the first time after the time tx when the packet Pi was skipped. The verification support apparatus 101 further enables computation of the time d[i], the time that elapses from the time tx when the packet Pi is skipped until the time ty when the packet Pi is transmitted.
- the delay time i.e., the excess time consumed for commencement of the transmission of the packet Pi
- the delay time consequent to the transmission source device 102 failing to transmit the packet Pi in the prescribed sequence can be identified.
- the verification support apparatus 101 enables computation of the delay time D[i], by summing the times d[i] of packets Pi included a transaction Ti.
- the delay time i.e., the excess time consumed for completion of the transmission for the transaction Ti
- the delay time equivalent to the sum of the respective times d[i] of packets Pi that are skipped among packets Pi included in the transaction Ti, can be identified.
- the verification support apparatus 101 enables determination of whether the delay time D[i] corresponding to a transaction Ti is greater than a threshold Dth. Thus, a transaction Ti having a delay time D[i] that exceeds a value (threshold Dth) allowed by the designer or customer can be identified.
- the verification support apparatus 101 enables the number of delay times D[i] (respectively corresponding to transactions Ti) that have been determined to be greater than the threshold Dth, to be counted for each transfer scheme Ty[j].
- the number (count C[j]) of transactions Ti having a delay time D[i] that is greater than the threshold Dth can be identified for each transfer scheme Ty[j].
- the verification support apparatus 101 enables computation of the ratio R[j] of the count C[j] for the transfer scheme Ty[j], with respect to the total count C ALL and determination of whether the ratio R[j] is greater than a threshold Rth.
- the verification support program, the verification support apparatus, and the verification support method enable support of verification work to identify causes of transaction Ti delays occurring with the transmission source device 102 and enable a reduction in the verification period for the transmission source device 102 .
- the verification support method described in the present embodiment may be implemented by executing a prepared program on a computer such as a personal computer and a workstation.
- the program is stored on a computer-readable, non-transitory medium such as a hard disk, a flexible disk, a CD-ROM, an MO, and a DVD, read out from the recording medium, and executed by the computer.
- the program may be a transmission medium that can be distributed through a network such as the Internet.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
d[i]=ty−tx (1)
D[i]=D[i]+d[i] (2)
R[j]=100×C[j]/C ALL (4)
Claims (8)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-152258 | 2010-07-02 | ||
JP2010152258A JP5573431B2 (en) | 2010-07-02 | 2010-07-02 | Verification support program, verification support apparatus, and verification support method |
Publications (2)
Publication Number | Publication Date |
---|---|
US20120005335A1 US20120005335A1 (en) | 2012-01-05 |
US8521872B2 true US8521872B2 (en) | 2013-08-27 |
Family
ID=45400570
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/064,901 Expired - Fee Related US8521872B2 (en) | 2010-07-02 | 2011-04-25 | Computer product, verification support apparatus, and verification support method |
Country Status (2)
Country | Link |
---|---|
US (1) | US8521872B2 (en) |
JP (1) | JP5573431B2 (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06152648A (en) | 1992-11-09 | 1994-05-31 | Mitsubishi Electric Corp | Data packet communication method |
JP2001111608A (en) | 1999-10-07 | 2001-04-20 | Canon Inc | Packet reordering device, its communication network and communication control method |
JP2005210515A (en) | 2004-01-23 | 2005-08-04 | Nippon Telegr & Teleph Corp <Ntt> | Network quality single point observation type measurement method and apparatus |
US20050192098A1 (en) * | 2004-02-27 | 2005-09-01 | Guo Katherine H. | Apparatus and method for fair message exchanges in distributed multi-player games |
JP2008017407A (en) | 2006-07-10 | 2008-01-24 | Nec Corp | Network quality measuring instrument and method thereof |
US20080080551A1 (en) * | 2006-09-29 | 2008-04-03 | Honeywell International Inc. | Systems and methods for fault-tolerant high integrity data propagation using a half-duplex braided ring network |
US20080247357A1 (en) * | 2005-11-18 | 2008-10-09 | Sk Telecom Co., Ltd. | Method For Adaptive Delay Threshold-Based Priority Queueing Scheme For Packet Scheduling in Mobile Broadband Wireless Access System |
US20100123769A1 (en) * | 2008-11-14 | 2010-05-20 | Pantech Co., Ltd. | Method for establishing fast session of video call and terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001069163A (en) * | 1999-08-26 | 2001-03-16 | Ando Electric Co Ltd | Usb data monitor device |
JP2002259231A (en) * | 2001-03-02 | 2002-09-13 | Hitachi Ltd | Information terminal equipment |
-
2010
- 2010-07-02 JP JP2010152258A patent/JP5573431B2/en not_active Expired - Fee Related
-
2011
- 2011-04-25 US US13/064,901 patent/US8521872B2/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06152648A (en) | 1992-11-09 | 1994-05-31 | Mitsubishi Electric Corp | Data packet communication method |
JP2001111608A (en) | 1999-10-07 | 2001-04-20 | Canon Inc | Packet reordering device, its communication network and communication control method |
JP2005210515A (en) | 2004-01-23 | 2005-08-04 | Nippon Telegr & Teleph Corp <Ntt> | Network quality single point observation type measurement method and apparatus |
US20050192098A1 (en) * | 2004-02-27 | 2005-09-01 | Guo Katherine H. | Apparatus and method for fair message exchanges in distributed multi-player games |
US20080247357A1 (en) * | 2005-11-18 | 2008-10-09 | Sk Telecom Co., Ltd. | Method For Adaptive Delay Threshold-Based Priority Queueing Scheme For Packet Scheduling in Mobile Broadband Wireless Access System |
JP2008017407A (en) | 2006-07-10 | 2008-01-24 | Nec Corp | Network quality measuring instrument and method thereof |
US20080080551A1 (en) * | 2006-09-29 | 2008-04-03 | Honeywell International Inc. | Systems and methods for fault-tolerant high integrity data propagation using a half-duplex braided ring network |
US20100123769A1 (en) * | 2008-11-14 | 2010-05-20 | Pantech Co., Ltd. | Method for establishing fast session of video call and terminal |
Non-Patent Citations (1)
Title |
---|
Demichelis, C. & Chimento, P., IP Packet Delay Variation Metric for IP Performance Metrics (IPPM), Nov. 2002, IETF. * |
Also Published As
Publication number | Publication date |
---|---|
JP2012015905A (en) | 2012-01-19 |
JP5573431B2 (en) | 2014-08-20 |
US20120005335A1 (en) | 2012-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10467244B2 (en) | Automatic generation of structured data from semi-structured data | |
EP2733615B1 (en) | System and method to validate test cases | |
US20110161903A1 (en) | Verification support computer product and apparatus | |
CN112926285A (en) | Chip verification method, platform, device, equipment and storage medium | |
CN110377885B (en) | Methods, devices, equipment and computer storage media for converting PDF files | |
US8483083B2 (en) | Computer product, testing apparatus, and testing method | |
CN109002952A (en) | The system of operation and management | |
US8903696B2 (en) | System and method for controlling granularity of transaction recording in discrete event simulation | |
EP3160087A1 (en) | Measuring frame loss | |
US11048448B2 (en) | Information processing apparatus and power estimation method | |
US8060313B2 (en) | Simulation system using electromagnetic field analysis and circuit analysis and recording medium storing simulation program | |
US8521872B2 (en) | Computer product, verification support apparatus, and verification support method | |
CN111047433A (en) | Method and device for analyzing reasons of user number abnormality, server and storage medium | |
US8514726B2 (en) | Computer product, apparatus, and method for device testing | |
US8681636B2 (en) | Monitoring apparatus, method, and computer product | |
CN107679766B (en) | Dynamic redundant scheduling method and device for crowd-sourcing task | |
US9183042B2 (en) | Input/output traffic backpressure prediction | |
US7561161B2 (en) | Quantitative measure of a video interface | |
Abdelrazeq et al. | Model verification for Lévy-driven Ornstein-Uhlenbeck processes | |
US20180330485A1 (en) | Non-transitory computer-readable storage medium for storing comparison program, comparison device, and comparison method | |
CN115934164A (en) | Application Compatibility Detection Method and System for Migration of Domestic Software and Hardware Environments | |
Bhatia et al. | A generic method and software to estimate the transmission advantage of pathogen variants in real-time: SARS-CoV-2 as a case-study | |
US8949862B2 (en) | Rate of operation progress reporting | |
US9589020B2 (en) | Matching method and computer-readable recording medium | |
US20080216084A1 (en) | Measure selection program, measure selection apparatus, and measure selection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PARIZY, MATTHIEU;IWASHITA, HIROAKI;REEL/FRAME:026250/0209 Effective date: 20110223 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |